Te Posted bymaster May 31, 2021 Leave a comment on Te Welcome to your Te Name Email Date of Birth Phone number 26. Which of the following items are not commonly associated with restricted interfaces? Deselect Answer Database views Menus Keyboards Shells 27. What type of attack can be prevented by using a trusted path? Deselect Answer Brute force attacks Login spoofing Dictionary attacks Man-in-the-middle attacks guyyigyugul Deselect Answer rtserwtzer xerdxt noijojoi 29. Jim has been contracted to perform a penetration test of a bank’s primary branch. In order to make the test as real as possible, he has not been given any information about the bank other than its name and address. What type of penetration test has Jim agreed to perform? Deselect Answer A gray box penetration test A white box penetration test A crystal box penetration test A black box penetration test 28. What major issue often results from decentralized access control? Deselect Answer Access outages may occur Control is too granular Training costs are high Control is not consistent 18. Which of the following is not a potential problem with active wireless scanning? Deselect Answer Accidently scanning apparent rogue devices that actually belong to guests Scanning devices that belong to nearby organizations Causing alarms on the organization’s wireless IPS Misidentifying rogue devices ifiyfyt Deselect Answer iouo joijoijo ytfytfyi Time is Up!